Stop Robocalls Forever!
The GSMA Whitepaper , issued in Feb 2020, provides a good roundup of the various solutions and mitigations being considered for the problem of illicit robocalls. In addition, the ATIS Paper , issued in Feb 2021, also provides an overview of the illicit robocalling problem along with some mitigation techniques and their challenges. The key approaches, according to them, are as follows:Â
Blocklisting RobocallsÂ
The simplest technique to prevent spam or scam robocalls  is the Blocklist. Blocklists can be super-simple â the user simply adds spam/scam numbers immediately after they are received, and if the blocklist is integrated into the phone, new incoming calls can be checked and blocked. Â
Crowdsourcing BlocklistsÂ
Crowdsourcing Blocklists are already very popular with consumers â Truecaller, Robokiller, and YouMail are some examples, though all of them now supplement crowdsourcing with other techniques to identify illicit robocalls. Â
At its simplest, a crowdsourcing blocklist approach consists of a database and an app. Users install the app and mark every incoming call as spam or not spam. Spam numbers are then kept on the common database, which is looked up for all incoming calls by the app. Â
Recommended by LinkedIn
The big challenge with blocklists (crowdsourced or otherwise) is caller-ID spoofing  â illicit robocallers regularly spoof their caller IDs, making it difficult to identify where the incoming call is originating from. Other challenges also exist â Â
Most of the crowdsourcing blocklist providers enable APIs that enterprises can use to get the same value that consumers get. Â
STIR/SHAKENÂ
Two caller-ID authentication technologies being aggressively promoted and deployed across the US are Secure Telephony Identity Revisited (STIR) and Secure Handling of Asserted information using toKENs (SHAKEN). Pushed by the FTC, service providers across the US are rolling out these standards across their entire network.
Read the rest of this article on - 5 approaches to mitigate illicit robocalls problem
Cybersecurity, Cyber Forensics, High-Performance Databases
2yLove the graphics. It aptly shows the spammers are there to get you by various obfuscation techniques./ However, as you mentioned, there are ways to identify and block them with accuracy. Well written!